Lucene search

K
cveMitreCVE-2021-33316
HistoryMay 11, 2022 - 6:15 p.m.

CVE-2021-33316

2022-05-1118:15:22
CWE-20
mitre
web.nvd.nist.gov
58
4
cve-2021-33316
trendnet
ti-pg1284i
switch
hardware
vulnerability

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.002

Percentile

61.0%

The TRENDnet TI-PG1284i switch(hw v2.0R) prior to version 2.0.2.S0 suffers from an integer underflow vulnerability. This vulnerability exists in its lldp related component. Due to lack of proper validation on length field of ChassisID TLV, by sending a crafted lldp packet to the device, integer underflow would occur and the negative number will be passed to memcpy() later, which may cause buffer overflow or invalid memory access.

Affected configurations

Nvd
Node
trendnetti-pg1284i_firmwareRange<2.0.2.s0
AND
trendnetti-pg1284iMatch2.0r
Node
trendnetti-g102i_firmwareMatch-
AND
trendnetti-g102iMatch-
Node
trendnetti-g160i_firmwareMatch-
AND
trendnetti-g160iMatch-
Node
trendnetti-g642i_firmwareMatch-
AND
trendnetti-g642iMatch-
Node
trendnetti-pg102i_firmwareMatch-
AND
trendnetti-pg102iMatch-
Node
trendnetti-pg541i_firmwareMatch-
AND
trendnetti-pg541iMatch-
Node
trendnetti-rp262i_firmwareMatch-
AND
trendnetti-rp262iMatch-
Node
trendnetteg-30102ws_firmwareMatch-
AND
trendnetteg-30102wsMatch-
Node
trendnettpe-30102ws_firmwareMatch-
AND
trendnettpe-30102wsMatch-
VendorProductVersionCPE
trendnetti-pg1284i_firmware*cpe:2.3:o:trendnet:ti-pg1284i_firmware:*:*:*:*:*:*:*:*
trendnetti-pg1284i2.0rcpe:2.3:h:trendnet:ti-pg1284i:2.0r:*:*:*:*:*:*:*
trendnetti-g102i_firmware-cpe:2.3:o:trendnet:ti-g102i_firmware:-:*:*:*:*:*:*:*
trendnetti-g102i-cpe:2.3:h:trendnet:ti-g102i:-:*:*:*:*:*:*:*
trendnetti-g160i_firmware-cpe:2.3:o:trendnet:ti-g160i_firmware:-:*:*:*:*:*:*:*
trendnetti-g160i-cpe:2.3:h:trendnet:ti-g160i:-:*:*:*:*:*:*:*
trendnetti-g642i_firmware-cpe:2.3:o:trendnet:ti-g642i_firmware:-:*:*:*:*:*:*:*
trendnetti-g642i-cpe:2.3:h:trendnet:ti-g642i:-:*:*:*:*:*:*:*
trendnetti-pg102i_firmware-cpe:2.3:o:trendnet:ti-pg102i_firmware:-:*:*:*:*:*:*:*
trendnetti-pg102i-cpe:2.3:h:trendnet:ti-pg102i:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 181

Social References

More

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.002

Percentile

61.0%

Related for CVE-2021-33316